First published: Fri Nov 15 2024(Updated: )
Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. These vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account. Note: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco TelePresence Collaboration Endpoint Software | ||
Cisco RoomOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20092 has been rated with a medium severity level.
To fix CVE-2023-20092, update the affected Cisco TelePresence Collaboration Endpoint or RoomOS Software to the latest version provided by Cisco.
Cisco TelePresence Collaboration Endpoint and Cisco RoomOS Software users are affected by CVE-2023-20092.
CVE-2023-20092 allows an authenticated local attacker to overwrite arbitrary files on the local file system.
CVE-2023-20092 exploits improper access controls on certain files within the Cisco TelePresence CE and RoomOS CLI.